期刊文献+

僵尸网络活动调查分析 被引量:14

Investigation on the botnets activities
下载PDF
导出
摘要 僵尸网络已经成为网络攻击者首选的攻击平台,用以发起分布式拒绝服务攻击、窃取敏感信息和发送垃圾邮件等,对公共互联网的正常运行和互联网用户的利益造成了严重的威胁。较大规模地发现和监测实际僵尸网络的活动行为并对其规律进行深入调查分析,是更为全面地监测僵尸网络和对其实施反制的必要前提。通过对所监测的1 961个实际僵尸网络的活动情况进行了深入调查和分析,从中给出了僵尸网络数量增长情况、控制服务器分布、僵尸网络规模、被控主机分布以及僵尸网络各种攻击行为的分析结果。 Botnets have become the first-choice attack platform for the network attackers to launch distributed denial of service attacks, steal sensitive information and send spam. They have raised serious threats to normal operation of the Intemet and the benefits of the Intemet users. The investigation on the wild botnets activities is the necessary for the further monitering and countermeasure against world-wide botnets. Based on the investigation and analysis on tracking records of I 961 wild botnets, it shows the statistical results of botnet activities, including amount of botnets, command and control channel distributions, botnet size and end-host distributions, and various types of botnet attack activities.
出处 《通信学报》 EI CSCD 北大核心 2007年第12期167-172,共6页 Journal on Communications
基金 国家高技术研究发展计划("863"计划)基金资助项目(2006AA01Z445) 国家"242"信息安全计划基金资助项目(2007G23)~~
关键词 僵尸网络 僵尸程序 恶意代码 蜜罐 蜜网 botnet bot malware honeypot honeynet
  • 相关文献

参考文献7

  • 1诸葛建伟,韩心慧,叶志远,邹维.僵尸网络的发现与跟踪[A].全国网络与信息安全技术研讨会(NetSec’05)[C].北京,2005.
  • 2RAJAB M A, ZARFOSS J, MONROSE F, et al. A multifaceted approach to understanding the botnet phenomenon[A]. Proceedings of the 6th ACM Internet Measurement Conference (IMC'06)[C].Rio de Janeriro, Brazil, 2006. 41-52.
  • 3WICHERSKI F C, HOLZ T, WICHERSKI G. Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of- service attacks[A]. Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS'05)[C]. Springer, Milan, Italy, 2005. 319-335.
  • 4BAECHER E HOLZ T, KOETTER M, WICHERSKI G. Know your enemy: tracking bothers, using honeynets to learn more about Bots [EB/OL]. http://www.honeynet.org/papers/bots/, 2005, 2007.
  • 5BARFORD P, YEGNESWARAN V. An inside look at botnets[A]. Special Workshop on Malware Detection, Advances in Information Security[C].Springer Vedag, Arlington, VA, 2006.
  • 6CANAVAN J. The evolution of malicious IRC bots[A].Proceedings of the 2005 Virus Bulletin Conference[C]. Burlington, Dublin, 2005.
  • 7DAGON D, ZOU C, LEE W. Modeling botnet propagation using time zones[A].Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS'06)[C].San Diego, CA, 2006.

共引文献1

同被引文献60

引证文献14

二级引证文献259

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部